P-660H/HW/W T Series User's Guide V3.40 (July 2005)
Document Creator
FrameMaker 7.1
Document Author:
Cindy Yang
P-660H/HW/W-T Series User’ Guide
Figure 193 Sample Error and Information Messages
53 Sat Jan 01 00:00:03 2000 PP01 -WARN SNMP TRAP 0: cold start
54 Sat Jan 01 00:00:03 2000 PP01 INFO main: init completed
55 Sat Jan 01 00:00:03 2000 PP01 INFO Starting Connectivity Monitor
56 Sat Jan 01 00:00:03 2000 PP20 INFO adjtime task pause 1 day
57 Sat Jan 01 00:00:03 2000 PP21 INFO monitoring WAN connectivity
58 Sat Jan 01 00:03:06 2000 PP19 INFO SMT Password pass
59 Sat Jan 01 00:03:06 2000 PP01 INFO SMT Session Begin
60 Sat Jan 01 00:23:21 2000 PP01 INFO SMT Session End
62 Sat Jan 01 00:23:38 2000 PP19 INFO SMT Password pass
63 Sat Jan 01 00:23:38 2000 PP01 INFO SMT Session Begin
Clear Error Log (y/n):
32.4.2 Syslog and Accounting
The Prestige uses the syslog facility to log the CDR (Call Detail Record) and system messages
to a syslog server. Syslog and accounting can be configured in Menu 24.3.2 — System
Maintenance — UNIX Syslog, as shown next.
Figure 194 Menu 24.3.2 System Maintenance: Syslog and Accounting
Menu 24.3.2 - System Maintenance - UNIX Syslog
UNIX Syslog:
Active= No
Syslog IP Address= ?
Log Facility= Local 1
Press ENTER to Confirm or ESC to Cancel:
You need to configure the UNIX syslog parameters described in the following table to activate
syslog then choose what you want to log.
Table 107 Menu 24.3.2 System Maintenance : Syslog and Accounting
PARAMETER
DESCRIPTION
UNIX Syslog:
Active
Use [SPACE BAR] and then [ENTER] to turn syslog on or off.
Syslog IP Address
Type the IP address of your syslog server.
Log Facility
Use [SPACE BAR] and then [ENTER] to select one of seven different local
options. The log facility lets you log the message in different server files. Refer to
your UNIX manual.
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm
or ESC to Cancel:” to save your configuration, or press [ESC] at any time to cancel.
The following are examples of the four types of syslog messages sent by the Prestige:
301
Chapter 32 System Information and Diagnosis
P-660H/HW/W-T Series User’ Guide
Figure 195 Syslog Example
1 - CDR
SdcmdSyslogSend ( SYSLOG_CDR, SYSLOG_INFO, String);
String = board xx line xx channel xx, call xx, str
board = the hardware board ID
line = the WAN ID in a board
Channel = channel ID within the WAN
call = the call reference number which starts from 1 and increments by 1 for each new
call
str = C01 Outgoing Call dev xx ch xx (dev:device No. ch:channel No.)
C01 Incoming Call xxxxBps xxxxx (L2TP, xxxxx = Remote Call ID)
C01 Incoming Call xxxx (= connected speed) xxxxx (= Remote Call ID)
L02 Tunnel Connected (L2TP)
C02 OutCall Connected xxxx (= connected speed) xxxxx (= Remote Call ID)
C02 CLID call refused
L02 Call Terminated
C02 Call Terminated
Jul 19 11:19:27
Call dev=2 ch=0
Jul 19 11:19:32
Connected 64000
Jul 19 11:20:06
Terminated
192.168.102.2 ZYXEL: board 0 line 0 channel 0, call 1, C01 Outgoing
40002
192.168.102.2 ZYXEL: board 0 line 0 channel 0, call 1, C02 OutCall
40002
192.168.102.2 ZYXEL: board 0 line 0 channel 0, call 1, C02 Call
2 - Packet Triggered
SdcmdSyslogSend (SYSLOG_PKTTRI, SYSLOG_NOTICE, String);
String = Packet trigger: Protocol=xx Data=xxxxxxxxxx…..x
Protocol: (1:IP 2:IPX 3:IPXHC 4:BPDU 5:ATALK 6:IPNG)
Data: We will send forty-eight Hex characters to the server
Jul 19 11:28:39 192.168.102.2 ZYXEL: Packet Trigger: Protocol=1,
Data=4500003c100100001f010004c0a86614ca849a7b08004a5c020001006162636465666768696a6b6c
6d6e6f7071727374
Jul 19 11:28:56 192.168.102.2 ZYXEL: Packet Trigger: Protocol=1,
Data=4500002c1b0140001f06b50ec0a86614ca849a7b0427001700195b3e00000000600220008cd40000
020405b4
Jul 19 11:29:06 192.168.102.2 ZYXEL: Packet Trigger: Protocol=1,
Data=45000028240140001f06ac12c0a86614ca849a7b0427001700195b451d1430135004000077600000
3 - Filter Log
SdcmdSyslogSend (SYSLOG_FILLOG, SYSLOG_NOTICE, String);
String = IP[Src=xx.xx.xx.xx Dst=xx.xx.xx.xx prot spo=xxxx dpo=xxxx] S04>R01mD
IP[…] is the packet header and S04>R01mD means filter set 4 (S) and rule 1 (R), match
(m), drop (D).
Src: Source Address
Dst: Destination Address
Chapter 32 System Information and Diagnosis
302
P-660H/HW/W-T Series User’ Guide
Figure 195 Syslog Example (continued)
prot: Protocol (“TCP”, ”UDP”, ”ICMP”)
spo: Source port
dpo: Destination port
Jul 19 14:43:55 192.168.102.2 ZYXEL: IP [Src=202.132.154.123 Dst=255.255.255.255 UDP
spo=0208 dpo=0208]} S03>R01mF
Jul 19 14:44:00 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP
spo=05d4 dpo=0035]} S03>R01mF
Jul 19 14:44:04 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP
spo=05d4 dpo=0035]} S03>R01mF
4 - PPP Log
SdcmdSyslogSend (SYSLOG_PPPLOG, SYSLOG_NOTICE, String);
String = ppp:Proto Starting / ppp:Proto Opening / ppp:Proto Closing / ppp:Proto
Shutdown
Proto = LCP / ATCP / BACP / BCP / CBCP / CCP / CHAP/ PAP / IPCP / IPXCP
Jul 19 11:42:44 192.168.102.2 ZYXEL: ppp:LCP Closing
Jul 19 11:42:49 192.168.102.2 ZYXEL: ppp:IPCP Closing
Jul 19 11:42:54 192.168.102.2 ZYXEL: ppp:CCP Closing
32.5 Diagnostic
The diagnostic facility allows you to test the different aspects of your Prestige to determine if
it is working properly. Menu 24.4 allows you to choose among various types of diagnostic
tests to evaluate your system, as shown in the following figure.
Follow the procedure next to get to Diagnostic:
1 From the main menu, type 24 to open Menu 24 – System Maintenance.
2 From this menu, type 4. Diagnostic to open Menu 24.4 – System Maintenance –
Diagnostic.
Figure 196 Menu 24.4 System Maintenance : Diagnostic
Menu 24.4 - System Maintenance - Diagnostic
xDSL
1.
Reset xDSL
System
21. Reboot System
22. Command Mode
TCP/IP
12. Ping Host
Enter Menu Selection Number:
Host IP Address= N/A
303
Chapter 32 System Information and Diagnosis
P-660H/HW/W-T Series User’ Guide
The following table describes the diagnostic tests available in menu 24.4 for and the
connections.
Table 108 Menu 24.4 System Maintenance Menu: Diagnostic
FIELD
DESCRIPTION
Reset xDSL
Re-initialize the xDSL link to the telephone company.
Ping Host
Ping the host to see if the links and TCP/IP protocol on both systems are working.
Reboot System
Reboot the Prestige.
Command Mode
Type the mode to test and diagnose your Prestige using specified commands.
Host IP Address
If you typed 12 to Ping Host, now type the address of the computer you want to
ping.
Chapter 32 System Information and Diagnosis
304
P-660H/HW/W-T Series User’ Guide
305
Chapter 32 System Information and Diagnosis
P-660H/HW/W-T Series User’ Guide
CHAPTER 33
Firmware and Configuration File
Maintenance
This chapter tells you how to backup and restore your configuration file as well as upload new
firmware and configuration files.
33.1 Filename Conventions
The configuration file (often called the romfile or rom-0) contains the factory default settings
in the menus such as password, DHCP Setup, TCP/IP Setup, etc. It arrives from ZyXEL with a
“rom” filename extension. Once you have customized the Prestige's settings, they can be
saved back to your computer under a filename of your choosing.
ZyNOS (ZyXEL Network Operating System sometimes referred to as the “ras” file) is the
system firmware and has a “bin” filename extension. With many FTP and TFTP clients, the
filenames are similar to those seen next.
Note: Only use firmware for your Prestige’s specific model. Refer to the label on the
bottom of your Prestige.
ftp> put firmware.bin ras
This is a sample FTP session showing the transfer of the computer file "firmware.bin" to the
Prestige.
ftp> get rom-0 config.cfg
This is a sample FTP session saving the current configuration to the computer file
“config.cfg”.
If your (T)FTP client does not allow you to have a destination filename different than the
source, you will need to rename them as the Prestige only recognizes “rom-0” and “ras”. Be
sure you keep unaltered copies of both files for later use.
Chapter 33 Firmware and Configuration File Maintenance
306
P-660H/HW/W-T Series User’ Guide
The following table is a summary. Please note that the internal filename refers to the filename
on the Prestige and the external filename refers to the filename not on the Prestige, that is, on
your computer, local network or FTP site and so the name (but not the extension) may vary.
After uploading new firmware, see the ZyNOS F/W Version field in Menu 24.2.1 – System
Maintenance – Information to confirm that you have uploaded the correct firmware version.
The AT command is the command you enter after you press “y” when prompted in the SMT
menu to go into debug mode.
Table 109 Filename Conventions
FILE TYPE
INTERNAL NAME EXTERNAL NAME
DESCRIPTION
Configuration Rom-0
File
This is the configuration filename on the
Prestige. Uploading the rom-0 file replaces the
entire ROM file system, including your Prestige
configurations, system-related data (including
the default password), the error log and the
trace log.
*.rom
Firmware
This is the generic name for the ZyNOS
firmware on the Prestige.
*.bin
Ras
33.2 Backup Configuration
Option 5 from Menu 24 – System Maintenance allows you to backup the current Prestige
configuration to your computer. Backup is highly recommended once your Prestige is
functioning properly. FTP is the preferred methods for backing up your current configuration
to your computer since they are faster. Any serial communications program should work fine;
however, you must use Xmodem protocol to perform the download/upload and you don’t have
to rename the files.
Please note that terms “download” and “upload” are relative to the computer. Download
means to transfer from the Prestige to the computer, while upload means from your computer
to the Prestige.
33.2.1 Backup Configuration
Follow the instructions as shown in the next screen.
307
Chapter 33 Firmware and Configuration File Maintenance
P-660H/HW/W-T Series User’ Guide
Figure 197 Telnet in Menu 24.5
Menu 24.5 - System Maintenance - Backup Configuration
To transfer the configuration file to your workstation, follow the procedure
below:
1. Launch the FTP client on your workstation.
2. Type "open" and the IP address of your Prestige. Then type "root" and SMT
password as requested.
3. Locate the 'rom-0' file.
4. Type 'get rom-0' to back up the current Prestige configuration to
your workstation.
For details on FTP commands, please consult the documentation of your FTP
client program. For details on backup using TFTP (note that you must remain
in this menu to back up using TFTP), please see your Prestige manual.
Press ENTER to Exit:
33.2.2 Using the FTP Command from the Command Line
1 Launch the FTP client on your computer.
2 Enter “open”, followed by a space and the IP address of your Prestige.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is “1234”).
5 Enter “bin” to set transfer mode to binary.
6 Use “get” to transfer files from the Prestige to the computer, for example, “get rom-0
config.rom” transfers the configuration file on the Prestige to your computer and
renames it “config.rom”. See earlier in this chapter for more information on filename
conventions.
7 Enter “quit” to exit the ftp prompt.
33.2.3 Example of FTP Commands from the Command Line
Chapter 33 Firmware and Configuration File Maintenance
308
P-660H/HW/W-T Series User’ Guide
Figure 198 FTP Session Example
331 Enter PASS command
Password:
230 Logged in
ftp> bin
200 Type I OK
ftp> get rom-0 zyxel.rom
200 Port command okay
150 Opening data connection for STOR ras
226 File received OK
ftp: 16384 bytes sent in 1.10Seconds 297.89Kbytes/sec.
ftp> quit
33.2.4 GUI-based FTP Clients
The following table describes some of the commands that you may see in GUI-based FTP
clients.
Table 110 General Commands for GUI-based FTP Clients
COMMAND
DESCRIPTION
Host Address
Enter the address of the host server.
Login Type
Anonymous.
This is when a user I.D. and password is automatically supplied to the
server for anonymous access. Anonymous logins will work only if your ISP
or service administrator has enabled this option.
Normal.
The server requires a unique User ID and Password to login.
Transfer Type
Transfer files in either ASCII (plain text format) or in binary mode.
Initial Remote Directory
Specify the default remote directory (path).
Initial Local Directory
Specify the default local directory (path).
33.2.5 TFTP and FTP over WAN Management Limitations
TFTP, FTP and Telnet over WAN will not work when:
• You have disabled Telnet service in menu 24.11.
• You have applied a filter in menu 3.1 (LAN) or in menu 11.5 (WAN) to block Telnet
service.
• The IP address in the Secured Client IP field in menu 24.11 does not match the client IP.
If it does not match, the Prestige will disconnect the Telnet session immediately.
• You have an SMT console session running.
309
Chapter 33 Firmware and Configuration File Maintenance
P-660H/HW/W-T Series User’ Guide
33.2.6 Backup Configuration Using TFTP
The Prestige supports the up/downloading of the firmware and the configuration file using
TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as
well, it is not recommended.
To use TFTP, your computer must have both telnet and TFTP clients. To backup the
configuration file, follow the procedure shown next.
1 Use telnet from your computer to connect to the Prestige and log in. Because TFTP does
not have any security checks, the Prestige records the IP address of the telnet client and
accepts TFTP requests only from this address.
2 Put the SMT in command interpreter (CI) mode by entering 8 in Menu 24 – System
Maintenance.
3 Enter command “sys stdio 0” to disable the SMT timeout, so the TFTP transfer will
not be interrupted. Enter command “sys stdio 5” to restore the five-minute SMT
timeout (default) when the file transfer is complete.
4 Launch the TFTP client on your computer and connect to the Prestige. Set the transfer
mode to binary before starting data transfer.
5 Use the TFTP client (see the example below) to transfer files between the Prestige and the
computer. The file name for the configuration file is “rom-0” (rom-zero, not capital o).
Note that the telnet connection must be active and the SMT in CI mode before and during the
TFTP transfer. For details on TFTP commands (see following example), please consult the
documentation of your TFTP client program. For UNIX, use “get” to transfer from the
Prestige to the computer and “binary” to set binary transfer mode.
33.2.7 TFTP Command Example
The following is an example TFTP command:
tftp [-i] host get rom-0 config.rom
where “i” specifies binary image transfer mode (use this mode when transferring binary files),
“host” is the Prestige IP address, “get” transfers the file source on the Prestige (rom-0,
name of the configuration file on the Prestige) to the file destination on the computer and
renames it config.rom.
33.2.8 GUI-based TFTP Clients
The following table describes some of the fields that you may see in GUI-based TFTP clients.
Chapter 33 Firmware and Configuration File Maintenance
310
P-660H/HW/W-T Series User’ Guide
Table 111 General Commands for GUI-based TFTP Clients
COMMAND
DESCRIPTION
Host
Enter the IP address of the Prestige. 192.168.1.1 is the Prestige’s default IP address
when shipped.
Send/Fetch
Use “Send” to upload the file to the Prestige and “Fetch” to back up the file on your
computer.
Local File
Enter the path and name of the firmware file (*.bin extension) or configuration file (*.rom
extension) on your computer.
Remote File This is the filename on the Prestige. The filename for the firmware is “ras” and for the
configuration file, is “rom-0”.
Binary
Transfer the file in binary mode.
Abort
Stop transfer of the file.
Refer to Section 33.2.5 on page 309 to read about configurations that disallow TFTP and FTP
over WAN.
33.3 Restore Configuration
This section shows you how to restore a previously saved configuration. Note that this
function erases the current configuration before restoring a previous back up configuration;
please do not attempt to restore unless you have a backup configuration file stored on disk.
FTP is the preferred method for restoring your current computer configuration to your Prestige
since FTP is faster. Please note that you must wait for the system to automatically restart after
the file transfer is complete.
Note: Do not interrupt the file transfer process as this may PERMANENTLY
DAMAGE YOUR Prestige.
33.3.1 Restore Using FTP
For details about backup using (T)FTP please refer to earlier sections on FTP and TFTP file
upload in this chapter.
311
Chapter 33 Firmware and Configuration File Maintenance
P-660H/HW/W-T Series User’ Guide
Figure 199 Telnet into Menu 24.6
Menu 24.6 -- System Maintenance - Restore Configuration
To transfer the firmware and configuration file to your workstation, follow
the procedure below:
1. Launch the FTP client on your workstation.
2. Type "open" and the IP address of your Prestige. Then type "root" and SMT
password as requested.
3. Type "put backupfilename rom-0" where backupfilename is the name of
your backup configuration file on your workstation and rom-0 is the
remote file name on the Prestige. This restores the configuration
to
your Prestige.
4. The system reboots automatically after a successful file transfer
For details on FTP commands, please consult the documentation of your FTP
client program. For details on backup using TFTP (note that you must remain
in this menu to back up using TFTP), please see your Prestige manual.
Press ENTER to Exit:
1 Launch the FTP client on your computer.
2 Enter “open”, followed by a space and the IP address of your Prestige.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is “1234”).
5 Enter “bin” to set transfer mode to binary.
6 Find the “rom” file (on your computer) that you want to restore to your Prestige.
7 Use “put” to transfer files from the Prestige to the computer, for example, “put
config.rom rom-0” transfers the configuration file “config.rom” on your computer
to the Prestige. See earlier in this chapter for more information on filename conventions.
8 Enter “quit” to exit the ftp prompt. The Prestige will automatically restart after a
successful restore process.
33.3.2 Restore Using FTP Session Example
Figure 200 Restore Using FTP Session Example
ftp> put config.rom rom-0
200 Port command okay
150 Opening data connection for STOR rom-0
226 File received OK
221 Goodbye for writing flash
ftp: 16384 bytes sent in 0.06Seconds 273.07Kbytes/sec.
ftp>quit
Refer to Section 33.2.5 on page 309 to read about configurations that disallow TFTP and FTP
over WAN.
Chapter 33 Firmware and Configuration File Maintenance
312
P-660H/HW/W-T Series User’ Guide
33.4 Uploading Firmware and Configuration Files
This section shows you how to upload firmware and configuration files. You can upload
configuration files by following the procedure in Section 33.2 on page 307 or by following the
instructions in Menu 24.7.2 – System Maintenance – Upload System Configuration File.
Note: Do not interrupt the file transfer process as this may PERMANENTLY
DAMAGE YOUR Prestige.
33.4.1 Firmware File Upload
FTP is the preferred method for uploading the firmware and configuration. To use this feature,
your computer must have an FTP client.
When you telnet into the Prestige, you will see the following screens for uploading firmware
and the configuration file using FTP.
Figure 201 Telnet Into Menu 24.7.1 Upload System Firmware
Menu 24.7.1 - System Maintenance - Upload System Firmware
To upload the system firmware, follow the procedure below:
1. Launch the FTP client on your workstation.
2. Type "open" and the IP address of your system. Then type "root" and
SMT password as requested.
3. Type "put firmware filename ras" where "firmwarefilename" is the name
of your firmware upgrade file on your workstation and "ras" is the
remote file name on the system.
4. The system reboots automatically after a successful firmware upload.
For details on FTP commands, please consult the documentation of your FTP
client program. For details on uploading system firmware using TFTP (note
that you must remain on this menu to upload system firmware using TFTP),
please see your manual.
Press ENTER to Exit:
33.4.2 Configuration File Upload
You see the following screen when you telnet into menu 24.7.2.
313
Chapter 33 Firmware and Configuration File Maintenance
P-660H/HW/W-T Series User’ Guide
Figure 202 Telnet Into Menu 24.7.2 System Maintenance
Menu 24.7.2 - System Maintenance - Upload System Configuration File
To upload the system configuration file, follow the procedure below:
1. Launch the FTP client on your workstation.
2. Type "open" and the IP address of your system. Then type "root" and
SMT password as requested.
3. Type "put configuration filename rom-0" where "configurationfilename"
is the name of your system configuration file on your workstation, which
will be transferred to the "rom-0" file on the system.
4. The system reboots automatically after the upload system configuration
file process is complete.
For details on FTP commands, please consult the documentation of your FTP
client program. For details on uploading system firmware using TFTP (note
that you must remain on this menu to upload system firmware using TFTP),
please see your manual.
Press ENTER to Exit:
To upload the firmware and the configuration file, follow these examples
33.4.3 FTP File Upload Command from the DOS Prompt Example
1 Launch the FTP client on your computer.
2 Enter “open”, followed by a space and the IP address of your Prestige.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is “1234”).
5 Enter “bin” to set transfer mode to binary.
6 Use “put” to transfer files from the computer to the Prestige, for example, “put
firmware.bin ras” transfers the firmware on your computer (firmware.bin) to the
Prestige and renames it “ras”. Similarly, “put config.rom rom-0” transfers the
configuration file on your computer (config.rom) to the Prestige and renames it “rom-0”.
Likewise “get rom-0 config.rom” transfers the configuration file on the Prestige to
your computer and renames it “config.rom.” See earlier in this chapter for more
information on filename conventions.
7 Enter “quit” to exit the ftp prompt.
The Prestige automatically restarts after a successful file upload.
Chapter 33 Firmware and Configuration File Maintenance
314
P-660H/HW/W-T Series User’ Guide
33.4.4 FTP Session Example of Firmware File Upload
Figure 203 FTP Session Example of Firmware File Upload
331 Enter PASS command
Password:
230 Logged in
ftp> bin
200 Type I OK
ftp> put firmware.bin ras
200 Port command okay
150 Opening data connection for STOR ras
226 File received OK
ftp: 1103936 bytes sent in 1.10Seconds 297.89Kbytes/sec.
ftp> quit
More commands (found in GUI-based FTP clients) are listed earlier in this chapter.
Refer to Section 33.2.5 on page 309 to read about configurations that disallow TFTP and FTP
over WAN.
33.4.5 TFTP File Upload
The Prestige also supports the uploading of firmware files using TFTP (Trivial File Transfer
Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended.
To use TFTP, your computer must have both telnet and TFTP clients. To transfer the firmware
and the configuration file, follow the procedure shown next.
1 Use telnet from your computer to connect to the Prestige and log in. Because TFTP does
not have any security checks, the Prestige records the IP address of the telnet client and
accepts TFTP requests only from this address.
2 Put the SMT in command interpreter (CI) mode by entering 8 in Menu 24 – System
Maintenance.
3 Enter the command “sys stdio 0” to disable the console timeout, so the TFTP transfer
will not be interrupted. Enter “sys stdio 5” to restore the five-minute console timeout
(default) when the file transfer is complete.
4 Launch the TFTP client on your computer and connect to the Prestige. Set the transfer
mode to binary before starting data transfer.
5 Use the TFTP client (see the example below) to transfer files between the Prestige and the
computer. The file name for the firmware is “ras”.
Note that the telnet connection must be active and the Prestige in CI mode before and during
the TFTP transfer. For details on TFTP commands (see following example), please consult the
documentation of your TFTP client program. For UNIX, use “get” to transfer from the
Prestige to the computer, “put” the other way around, and “binary” to set binary transfer
mode.
315
Chapter 33 Firmware and Configuration File Maintenance
P-660H/HW/W-T Series User’ Guide
33.4.6 TFTP Upload Command Example
The following is an example TFTP command:
tftp [-i] host put firmware.bin ras
where “i” specifies binary image transfer mode (use this mode when transferring binary files),
“host” is the Prestige’s IP address and “put” transfers the file source on the computer
(firmware.bin – name of the firmware on the computer) to the file destination on the
remote host (ras - name of the firmware on the Prestige).
Commands that you may see in GUI-based TFTP clients are listed earlier in this chapter.
Chapter 33 Firmware and Configuration File Maintenance
316
P-660H/HW/W-T Series User’ Guide
317
Chapter 33 Firmware and Configuration File Maintenance
P-660H/HW/W-T Series User’ Guide
CHAPTER 34
System Maintenance
This chapter leads you through SMT menus 24.8 to 24.10.
34.1 Command Interpreter Mode
The Command Interpreter (CI) is a part of the main system firmware. The CI provides much of
the same functionality as the SMT, while adding some low-level setup and diagnostic
functions. Enter the CI from the SMT by selecting menu 24.8. See the included disk or the
zyxel.com web site for more detailed information on CI commands. Enter 8 from Menu 24 —
System Maintenance. A list of valid commands can be found by typing help or ? at the
command prompt. Type “exit” to return to the SMT main menu when finished.
Figure 204 Command Mode in Menu 24
Menu 24 - System Maintenance
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
System Status
System Information and Console Port Speed
Log and Trace
Diagnostic
Backup Configuration
Restore Configuration
Upload Firmware
Command Interpreter Mode
Call Control
Time and Date Setting
Remote Management
Enter Menu Selection Number:
Figure 205 Valid Commands
Copyright (c) 1994 - 2004 ZyXEL Communications Corp.
ras> ?
Valid commands are:
sys
exit
device
ether
wan
poe
config
pci
wlan
ip
ppp
bridge
hdap
bm
lan
radius
8021x
ras>
Chapter 34 System Maintenance
318
P-660H/HW/W-T Series User’ Guide
34.2 Call Control Support
Call Control Support is only applicable when Encapsulation is set to PPPoE in menu 4 or
menu 11.1.
The budget management function allows you to set a limit on the total outgoing call time of
the Prestige within certain times. When the total outgoing call time exceeds the limit, the
current call will be dropped and any future outgoing calls will be blocked.
To access the call control menu, select option 9 in menu 24 to go to Menu 24.9 — System
Maintenance — Call Control, as shown in the next table.
Figure 206 Menu 24.9 System Maintenance: Call Control
Menu 24.9 - System Maintenance - Call Control
1. Budget Management
Enter Menu Selection Number:
34.2.1 Budget Management
Menu 24.9.1 shows the budget management statistics for outgoing calls. Enter 1 from Menu
24.9 — System Maintenance — Call Control to bring up the following menu.
319
Chapter 34 System Maintenance
P-660H/HW/W-T Series User’ Guide
Figure 207 Menu 24.9.1 System Maintenance: Budget Management
Menu 24.9.1 - System Maintenance - Budget Management
Remote Node
1.MyIsp
2.-------3.-------4.-------5.-------6.-------7.-------8.--------
Connection Time/Total Budget
No Budget
---------------
Elapsed Time/Total Period
No Budget
---------------
Reset Node (0 to update screen):
The total budget is the time limit on the accumulated time for outgoing calls to a remote node.
When this limit is reached, the call will be dropped and further outgoing calls to that remote
node will be blocked. After each period, the total budget is reset. The default for the total
budget is 0 minutes and the period is 0 hours, meaning no budget control. You can reset the
accumulated connection time in this menu by entering the index of a remote node. Enter 0 to
update the screen. The budget and the reset period can be configured in menu 11.1 for the
remote node when PPPoE encapsulation is selected.
Table 112 Menu 24.9.1 System Maintenance: Budget Management
FIELD
DESCRIPTION
Remote Node
Enter the index number of the remote node you want to reset (just one in
this case)
Connection Time/Total
Budget
This is the total connection time that has gone by (within the allocated
budget that you set in menu 11.1.
Elapsed Time/Total Period
The period is the time cycle in hours that the allocation budget is reset
(see menu 11.1.) The elapsed time is the time used up within this period.
Enter “0” to update the screen or press [ESC] to return to the previous screen.
34.3 Time and Date Setting
The Prestige keeps track of the time and date. There is also a software mechanism to set the
time manually or get the current time and date from an external server when you turn on your
Prestige. Menu 24.10 allows you to update the time and date settings of your Prestige. The real
time is then displayed in the Prestige error logs and firewall logs.
Select menu 24 in the main menu to open Menu 24 System Maintenance, as shown next.
Chapter 34 System Maintenance
320
P-660H/HW/W-T Series User’ Guide
Figure 208 Menu 24 System Maintenance
Menu 24 - System Maintenance
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
System Status
System Information and Console Port Speed
Log and Trace
Diagnostic
Backup Configuration
Restore Configuration
Upload Firmware
Command Interpreter Mode
Call Control
Time and Date Setting
Remote Management
Enter Menu Selection Number:
Then enter 10 to go to Menu 24.10 System Maintenance Time and Date Setting to update
the time and date settings of your Prestige as shown in the following screen.
Figure 209 Menu 24.10 System Maintenance: Time and Date Setting
Menu 24.10 - System Maintenance - Time and Date Setting
Use Time Server when Bootup= None
Time Server Address= N/A
Current Time:
00 : 51 : 24
New Time (hh:mm:ss):
00 : 51 : 19
Current Date:
2000 - 01 - 01
New Date (yyyy-mm-dd):
2000 - 01 - 01
Time Zone= GMT
Daylight Saving= No
Start Date (mm-dd):
01 - 00
End Date (mm-dd):
01 - 00
Press ENTER to Confirm or ESC to Cancel:
Table 113
321
Menu 24.10 System Maintenance: Time and Date Setting
FIELD
DESCRIPTION
Use Time Server
when Bootup
Enter the time service protocol that your time server sends when you turn on
the Prestige. Not all time servers support all protocols, so you may have to
check with your ISP/network administrator or use trial and error to find a
protocol that works. The main differences between them are the format.
Daytime (RFC 867) format is day/month/year/time zone of the server.
Time (RFC-868) format displays a 4-byte integer giving the total number of
seconds since 1970/1/1 at 0:0:0.
NTP (RFC-1305) is similar to Time (RFC-868).
None. The default, enter the time manually.
Time Server Address
Enter the IP address or domain name of your time server. Check with your ISP/
network administrator if you are unsure of this information.
Chapter 34 System Maintenance
P-660H/HW/W-T Series User’ Guide
Table 113
Menu 24.10 System Maintenance: Time and Date Setting (continued)
FIELD
DESCRIPTION
Current Time
This field displays an updated time only when you reenter this menu.
New Time
Enter the new time in hour, minute and second format.
Current Date
This field displays an updated date only when you re-enter this menu.
New Date
Enter the new date in year, month and day format.
Time Zone
Press [SPACE BAR] and then [ENTER] to set the time difference between your
time zone and Greenwich Mean Time (GMT).
Daylight Saving
If you use daylight savings time, then choose Yes.
Start Date
If using daylight savings time, enter the month and day that it starts on.
End Date
If using daylight savings time, enter the month and day that it ends on
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm
or ESC to Cancel:” to save your configuration, or press [ESC] at any time to cancel.
34.3.1 Resetting the Time
•
•
•
•
The Prestige resets the time in three instances:
On leaving menu 24.10 after making changes.
When the Prestige starts up, if there is a timeserver configured in menu 24.10.
24-hour intervals after starting.
Chapter 34 System Maintenance
322
P-660H/HW/W-T Series User’ Guide
323
Chapter 34 System Maintenance
P-660H/HW/W-T Series User’ Guide
CHAPTER 35
Remote Management
This chapter covers remote management (SMT menu 24.11).
35.1 Remote Management Overview
Remote management allows you to determine which services/protocols can access which
Prestige interface (if any) from which computers.
When you configure remote management to allow management from the WAN, you still need
to configure a firewall rule to allow access. See the firewall chapters for details on configuring
firewall rules.
35.2 Remote Management
To disable remote management of a service, select Disable in the corresponding Server
Access field.
Enter 11 from menu 24 to display Menu 24.11 — Remote Management Control.
35.2.1 Remote Management Setup
You may manage your Prestige from a remote location via:
the Internet (WAN only), the LAN only, All (LAN and WAN) or Disable (neither).
•
•
•
•
WAN only (Internet)
ALL (LAN and WAN)
LAN only
Disable (Neither)
If you enable remote management of a service, but have applied a filter to block the service,
then you will not be able to remotely manage the Prestige using the service.
Enter 11, from menu 24, to display Menu 24.11 — Remote Management Control (shown
next).
Chapter 35 Remote Management
324
P-660H/HW/W-T Series User’ Guide
Figure 210 Menu 24.11 Remote Management Control
Menu 24.11 - Remote Management Control
TELNET Server:
Server Port = 23
Secured Client IP = 0.0.0.0
FTP Server:
Server Port = 21
Secured Client IP = 0.0.0.0
Web Server:
Server Port = 80
Secured Client IP = 0.0.0.0
Server Access = LAN only
Server Access = LAN only
Server Access = LAN only
Press ENTER to Confirm or ESC to Cancel:
The following table describes the fields in this menu.
Table 114 Menu 24.11 Remote Management Control
FIELD
DESCRIPTION
Telnet Server
FTP Server
Web Server
Each of these read-only labels denotes a service or protocol.
Port
This field shows the port number for the service or protocol. You may change the
port number if needed, but you must use the same port number to access the
Prestige.
Access
Select the access interface (if any) by pressing the [SPACE BAR]. Choices are:
LAN only, WAN only, All or Disable. The default is LAN only.
Secured Client IP
The default 0.0.0.0 allows any client to use this service or protocol to access the
Prestige. Enter an IP address to restrict access to a client with a matching IP
address.
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm
or ESC to Cancel:” to save your configuration, or press [ESC] at any time to cancel.
35.2.2 Remote Management Limitations
Remote management over LAN or WAN will not work when:
• A filter in menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or
Web service.
• You have disabled that service in menu 24.11.
• The IP address in the Secured Client IP field (menu 24.11) does not match the client IP
address. If it does not match, the Prestige will disconnect the session immediately.
• There is already another remote management session with an equal or higher priority
running. You may only have one remote management session running at one time.
• There is a firewall rule that blocks it.
325
Chapter 35 Remote Management
P-660H/HW/W-T Series User’ Guide
35.3 Remote Management and NAT
When NAT is enabled:
• Use the Prestige’s WAN IP address when configuring from the WAN.
• Use the Prestige’s LAN IP address when configuring from the LAN.
35.4 System Timeout
There is a default system management idle timeout of five minutes (three hundred seconds).
The Prestige automatically logs you out if the management session remains idle for longer
than this timeout period. The management session does not time out when it is continuously
updating the status in menu 24.1 or when sys stdio has been changed on the command
line.
Chapter 35 Remote Management
326
P-660H/HW/W-T Series User’ Guide
327
Chapter 35 Remote Management
P-660H/HW/W-T Series User’ Guide
CHAPTER 36
IP Policy Routing
This chapter covers setting and applying policies used for IP routing.
36.1 IP Policy Routing Overview
Traditionally, routing is based on the destination address only and the IAD takes the shortest
path to forward a packet. IP Routing Policy (IPPR) provides a mechanism to override the
default routing behavior and alter the packet forwarding based on the policy defined by the
network administrator. Policy-based routing is applied to incoming packets on a per interface
basis, prior to the normal routing.
36.2 Benefits of IP Policy Routing
Source-Based Routing – Network administrators can use policy-based routing to direct traffic
from different users through different connections.
Quality of Service (QoS) – Organizations can differentiate traffic by setting the precedence or
TOS (Type of Service) values in the IP header at the periphery of the network to enable the
backbone to prioritize traffic.
Cost Savings – IPPR allows organizations to distribute interactive traffic on high-bandwidth,
high-cost paths while using low-cost paths for batch traffic.
Load Sharing – Network administrators can use IPPR to distribute traffic among multiple
paths.
36.3 Routing Policy
Individual routing policies are used as part of the overall IPPR process. A policy defines the
matching criteria and the action to take when a packet meets the criteria. The action is taken
only when all the criteria are met. The criteria includes the source address and port, IP protocol
(ICMP, UDP, TCP, etc.), destination address and port, TOS and precedence (fields in the IP
header) and length. The inclusion of length criterion is to differentiate between interactive and
bulk traffic. Interactive applications, for example, telnet, tend to have short packets, while bulk
traffic, for example, file transfer, tends to have large packets.
The actions that can be taken include:
Chapter 36 IP Policy Routing
328
P-660H/HW/W-T Series User’ Guide
• routing the packet to a different gateway (and hence the outgoing interface).
• setting the TOS and precedence fields in the IP header.
IPPR follows the existing packet filtering facility of RAS in style and in implementation. The
policies are divided into sets, where related policies are grouped together. A user defines the
policies before applying them to an interface or a remote node, in the same fashion as the
filters. There are 12 policy sets with six policies in each set.
36.4 IP Routing Policy Setup
Menu 25 shows all the policies defined.
Figure 211 Menu 25 IP Routing Policy Setup
Menu 25 - IP Routing Policy Setup
Policy
Set #
-----1
Name
----------------_______________
_______________
_______________
_______________
_______________
_______________
Set #
-----7
10
11
12
Name
----------------_______________
_______________
_______________
_______________
_______________
_______________
Enter Policy Set Number to Configure= 0
Edit Name= N/A
Press ENTER to Confirm or ESC to Cancel:
To setup a routing policy, perform the following procedures:
1 Type 25 in the main menu to open Menu 25 – IP Routing Policy Setup.
2 Type the index of the policy set you want to configure to open Menu 25.1 – IP Routing
Policy Setup.
Menu 25.1 shows the summary of a policy set, including the criteria and the action of a single
policy, and whether a policy is active or not. Each policy contains two lines. The former part is
the criteria of the incoming packet and the latter is the action. Between these two parts,
separator “|” means the action is taken on criteria matched and separator “=” means the action
is taken on criteria not matched.
329
Chapter 36 IP Policy Routing
P-660H/HW/W-T Series User’ Guide
Figure 212 Menu 25.1 IP Routing Policy Setup
Menu 25.1 - IP Routing Policy Setup
# A
Criteria/Action
- - ---------------------------------------------------------------------1 Y SA=1.1.1.1-1.1.1.1,DA=2.2.2.2-2.2.2.5
SP=20-25,DP=20-25,P=6,T=NM,PR=0
|GW=192.168.1.1,T=MT,PR=0
2 N ______________________________________________________________________
______________________________________________________________________
3 N ______________________________________________________________________
______________________________________________________________________
4 N ______________________________________________________________________
______________________________________________________________________
5 N ______________________________________________________________________
______________________________________________________________________
6 N ______________________________________________________________________
______________________________________________________________________
Enter Policy Rule Number (1-6) to Configure:
Table 115 Menu 25.1 IP Routing Policy Setup
ABBREVIATION
MEANING
Criterion
Source IP Address
SA
SP
Source Port
DA
Destination IP Address
DP
Destination Port
IP layer 4 protocol number (TCP=6, UDP=17…)
Type of service of incoming packet
PR
Precedence of incoming packet
Action
GW
Gateway IP address
Outgoing Type of service
Outgoing Precedence
Service
NM
Normal
MD
Minimum Delay
MT
Maximum Throughput
MR
Maximum Reliability
MC
Minimum Cost
Type a number from 1 to 6 to display Menu 25.1.1 – IP Routing Policy (see the next figure).
This menu allows you to configure a policy rule.
Chapter 36 IP Policy Routing
330
P-660H/HW/W-T Series User’ Guide
Figure 213 Menu 25.1.1 IP Routing Policy
Menu 25.1.1 - IP Routing Policy
Policy Set Name= test
Active= No
Criteria:
IP Protocol
= 0
Type of Service= Don't Care
Precedence
= Don't Care
Source:
addr start= 0.0.0.0
port start= N/A
Destination:
addr start= 0.0.0.0
port start= N/A
Action= Matched
Gateway addr
= 0.0.0.0
Type of Service= No Change
Precedence
= No Change
Packet length= 0
Len Comp= N/A
end= N/A
end= N/A
end= N/A
end= N/A
Log= No
Press ENTER to Confirm or ESC to Cancel:
The following table describes the fields in this menu.
Table 116 Menu 25.1.1 IP Routing Policy
FIELD
DESCRIPTION
Policy Set Name
This is the policy set name assigned in Menu 25 – IP Routing Policy Setup.
Active
Press [SPACE BAR] and then [ENTER] to select Yes to activate or No to
deactivate the policy. Inactive policies are displayed with a minus sign “-“ in SMT
menu 25.
Criteria
IP Protocol
IP layer 4 protocol, for example, UDP, TCP, ICMP, etc.
Type of Service
Prioritize incoming network traffic by choosing from Don’t Care, Normal, Min
Delay, Max Thruput, Min Cost or Max Reliable.
Precedence
Precedence value of the incoming packet. Press [SPACE BAR] and then
[ENTER] to select a value from 0 to 7 or Don’t Care.
Packet Length
Type the length of incoming packets (in bytes). The operators in the Len Comp
(next field) apply to packets of this length.
Len Comp
Press [SPACE BAR] and then [ENTER] to choose from Equal, Not Equal,
Less, Greater, Less or Equal or Greater or Equal.
Source:
addr start / end
Source IP address range from start to end.
port start / end
Source port number range from start to end; applicable only for TCP/UDP.
Destination:
331
addr start / end
Destination IP address range from start to end.
port start / end
Destination port number range from start to end; applicable only for TCP/UDP.
Action
Specifies whether action should be taken on criteria Matched or Not Matched.
Chapter 36 IP Policy Routing
P-660H/HW/W-T Series User’ Guide
Table 116 Menu 25.1.1 IP Routing Policy (continued)
FIELD
DESCRIPTION
Gateway addr
Defines the outgoing gateway address. The gateway must be on the same
subnet as the Prestige if it is on the LAN, otherwise, the gateway must be the IP
address of a remote node. The default gateway is specified as 0.0.0.0.
Type of Service
Set the new TOS value of the outgoing packet. Prioritize incoming network traffic
by choosing No Change, Normal, Min Delay, Max Thruput, Max Reliable or
Min Cost.
Precedence
Set the new outgoing packet precedence value. Values are 0 to 7 or No
Change.
Log
Press [SPACE BAR] and then [ENTER] to select Yes to make an entry in the
system log when a policy is executed.
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm
or ESC to Cancel:” to save your configuration, or press [ESC] at any time to cancel.
36.5 Applying an IP Policy
This section shows you where to apply the IP policies after you design them.
36.5.1 Ethernet IP Policies
From Menu 3 — Ethernet Setup, type 2 to go to Menu 3.2 — TCP/IP and DHCP Ethernet
Setup.
You can choose up to four IP policy sets (from 12) by typing their numbers separated by
commas, for example, 2, 4, 7, 9.
Chapter 36 IP Policy Routing
332
P-660H/HW/W-T Series User’ Guide
Figure 214 Menu 3.2 TCP/IP and DHCP Ethernet Setup
Menu 3.2 - TCP/IP and DHCP Setup
DHCP Setup
DHCP= Server
Client IP Pool Starting Address= 192.168.1.33
Size of Client IP Pool= 32
Primary DNS Server= 0.0.0.0
Secondary DNS Server= 0.0.0.0
Remote DHCP Server= N/A
TCP/IP Setup:
IP Address= 192.168.1.1
IP Subnet Mask= 255.255.255.0
RIP Direction= Both
Version= RIP-1
Multicast= None
IP Policies=
Edit IP Alias= No
Press ENTER to Confirm or ESC to Cancel:
Go to menu 11.3 (shown next) and type the number(s) of the IP Routing Policy set(s) as
appropriate. You can cascade up to four policy sets by typing their numbers separated by
commas.
Figure 215 Menu 11.3 Remote Node Network Layer Options
Menu 11.3 - Remote Node Network Layer Options
IP Options:
IP Address Assignment= Static
Rem IP Addr: 0.0.0.0
Rem Subnet Mask= 0.0.0.0
My WAN Addr= 0.0.0.0
NAT= Full Feature
Address Mapping Set= 2
Metric= 2
Private= No
RIP Direction= Both
Version= RIP-2B
Multicast= IGMP-v2
IP Policies=
Bridge Options:
Ethernet Addr Timeout (min)= 0
Press ENTER to Confirm or ESC to Cancel:
36.6 IP Policy Routing Example
If a network has both Internet and remote node connections, you can route Web packets to the
Internet using one policy and route FTP packets to a remote network using another policy. See
the next figure.
333
Chapter 36 IP Policy Routing
P-660H/HW/W-T Series User’ Guide
Route 1 represents the default IP route and route 2 represents the configured IP route.
Figure 216 Example of IP Policy Routing
To force packets coming from clients with IP addresses of 192.168.1.33 to 192.168.1.64 to be
routed to the Internet via the WAN port of the Prestige, follow the steps as shown next.
1 Create a routing policy set in menu 25.
2 Create a rule for this set in Menu 25.1.1 — IP Routing Policy as shown next.
Chapter 36 IP Policy Routing
334
P-660H/HW/W-T Series User’ Guide
Figure 217 IP Routing Policy Example
Menu 25.1.1 - IP Routing Policy
Policy Set Name= set1
Active= Yes
Criteria:
IP Protocol
= 6
Type of Service= Don't Care
Precedence
= Don't Care
Source:
addr start= 192.168.1.2
port start= 0
Destination:
addr start= 0.0.0.0
port start= 80
Action= Matched
Gateway addr = 192.168.1.1
Type of Service= No Change
Precedence
= No Change
Packet length= 10
Len Comp= N/A
end=
end=
end=
end=
Log=
192.168.1.64
N/A
N/A
80
No
Press ENTER to Confirm or ESC to Cancel:
1 Check Menu 25.1 — IP Routing Policy Setup to see if the rule is added correctly.
2 Create another policy set in menu 25.
3 Create a rule in menu 25.1 for this set to route packets from any host (IP=0.0.0.0
means any host) with protocol TCP and port FTP access through another gateway
(192.168.1.100).
335
Chapter 36 IP Policy Routing
P-660H/HW/W-T Series User’ Guide
Figure 218 IP Routing Policy Example
Menu 25.1.1 - IP Routing Policy
Policy Set Name= set2
Active= Yes
Criteria:
IP Protocol
= 6
Type of Service= Don't Care
Precedence
= Don't Care
Source:
addr start= 0.0.0.0
port start= 0
Destination:
addr start= 0.0.0.0
port start= 20
Action= Matched
Gateway addr =192.168.1.100
Type of Service= No Change
Precedence
= No Change
Packet length= 10
Len Comp= N/A
end=
end=
end=
end=
Log=
N/A
N/A
N/A
21
No
Press ENTER to Confirm or ESC to Cancel:
4 Check Menu 25.1 — IP Routing Policy Setup to see if the rule is added correctly.
5 Apply both policy sets in menu 3.2 as shown next.
Figure 219 Applying IP Policies Example
Menu 3.2 - TCP/IP and DHCP Ethernet Setup
DHCP Setup
DHCP= Server
Client IP Pool Starting Address= 192.168.1.33
Size of Client IP Pool= 64
Primary DNS Server= 0.0.0.0
Secondary DNS Server= 0.0.0.0
Remote DHCP Server= N/A
TCP/IP Setup:
IP Address= 192.168.1.1
IP Subnet Mask= 255.255.255.0
RIP Direction= Both
Version= RIP-1
Multicast= None
IP Policies= 1,2
Edit IP Alias= No
Press ENTER to Confirm or ESC to Cancel:
Chapter 36 IP Policy Routing
336
P-660H/HW/W-T Series User’ Guide
337
Chapter 36 IP Policy Routing
P-660H/HW/W-T Series User’ Guide
CHAPTER 37
Call Scheduling
Call scheduling (applicable for PPPoA or PPPoE encapsulation only) allows you to dictate
when a remote node should be called and for how long.
37.1 Introduction
The call scheduling feature allows the Prestige to manage a remote node and dictate when a
remote node should be called and for how long. This feature is similar to the scheduler in a
videocassette recorder (you can specify a time period for the VCR to record). You can apply
up to 4 schedule sets in Menu 11.1 — Remote Node Profile. From the main menu, enter 26
to access Menu 26 — Schedule Setup as shown next.
Figure 220 Menu 26 Schedule Setup
Menu 26 - Schedule Setup
Schedule
Set #
Name
------ ----------------1
_______________
_______________
_______________
_______________
_______________
_______________
Set #
-----7
10
11
12
Name
----------------_______________
_______________
_______________
_______________
_______________
_______________
Enter Schedule Set Number to Configure= 0
Edit Name= N/A
Press ENTER to Confirm or ESC to Cancel:
Lower numbered sets take precedence over higher numbered sets thereby avoiding scheduling
conflicts. For example, if sets 1, 2 ,3 and 4 in are applied in the remote node then set 1 will
take precedence over set 2, 3 and 4 as the Prestige, by default, applies the lowest numbered set
first. Set 2 will take precedence over set 3 and 4, and so on.
You can design up to 12 schedule sets but you can only apply up to four schedule sets for a
remote node.
To delete a schedule set, enter the set number and press [SPACE BAR] and then [ENTER]
(or delete) in the Edit Name field.
Chapter 37 Call Scheduling
338
P-660H/HW/W-T Series User’ Guide
To setup a schedule set, select the schedule set you want to setup from menu 26 (1-12) and
press [ENTER] to see Menu 26.1 — Schedule Set Setup as shown next.
Figure 221
Menu 26.1 Schedule Set Setup
Menu 26.1 Schedule Set Setup
Active= Yes
Start Date(yyyy-mm-dd)= 2000 - 01 - 01
How Often= Once
Once:
Date(yyyy-mm-dd)= 2000 - 01 - 01
Weekdays:
Sunday= N/A
Monday= N/A
Tuesday= N/A
Wednesday= N/A
Thursday= N/A
Friday= N/A
Saturday= N/A
Start Time(hh:mm)= 00: 00
Duration(hh:mm)= 00: 00
Action= Forced On
Press ENTER to Confirm or ESC to Cancel:
If a connection has been already established, your Prestige will not drop it. Once the
connection is dropped manually or it times out, then that remote node can't be triggered up
until the end of the Duration.
Table 117 Menu 26.1 Schedule Set Setup
339
FIELD
DESCRIPTION
Active
Press [SPACE BAR] to select Yes or No. Choose Yes and press [ENTER] to activate
the schedule set.
Start Date
Enter the start date when you wish the set to take effect in year -month-date format.
Valid dates are from the present to 2036-February-5.
How Often
Should this schedule set recur weekly or be used just once only? Press the [SPACE
BAR] and then [ENTER] to select Once or Weekly. Both these options are mutually
exclusive. If Once is selected, then all weekday settings are N/A. When Once is
selected, the schedule rule deletes automatically after the scheduled time elapses.
Once:
Date
If you selected Once in the How Often field above, then enter the date the set should
activate here in year-month-date format.
Weekday:
Day
If you selected Weekly in the How Often field above, then select the day(s) when the
set should activate (and recur) by going to that day(s) and pressing [SPACE BAR] to
select Yes, then press [ENTER].
Start Time
Enter the start time when you wish the schedule set to take effect in hour-minute format.
Duration
Enter the maximum length of time this connection is allowed in hour-minute format.
Chapter 37 Call Scheduling
P-660H/HW/W-T Series User’ Guide
Table 117 Menu 26.1 Schedule Set Setup (continued)
FIELD
DESCRIPTION
Action
Forced On means that the connection is maintained whether or not there is a demand
call on the line and will persist for the time period specified in the Duration field.
Forced Down means that the connection is blocked whether or not there is a demand
call on the line.
Enable Dial-On-Demand means that this schedule permits a demand call on the line.
Disable Dial-On-Demand means that this schedule prevents a demand call on the line.
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm
or ESC to Cancel:” to save your configuration, or press [ESC] at any time to cancel.
Once your schedule sets are configured, you must then apply them to the desired remote
node(s). Enter 11 from the Main Menu and then enter the target remote node index. Using
[SPACE BAR], select PPPoE or PPPoA in the Encapsulation field and then press
[ENTER] to make the schedule sets field available as shown next.
Figure 222 Applying Schedule Set(s) to a Remote Node (PPPoE)
Menu 11.1 - Remote Node Profile
Rem Node Name= MyISP
Active= Yes
Encapsulation= PPPoA
Multiplexing= LLC-based
Service Name= N/A
Incoming:
Rem Login=
Rem Password= ********
Outgoing:
My Login= ChangeMe
My Password= ********
Authen= CHAP/PAP
Route= IP
Bridge= No
Edit IP/Bridge= No
Edit ATM Options= No
Edit Advance Options= N/A
Telco Option:
Allocated Budget(min)= 0
Period(hr)= 0
Schedule Sets=
Nailed-Up Connection= No
Session Options:
Edit Filter Sets= No
Idle Timeout(sec)= 0
Press ENTER to Confirm or ESC to Cancel:
You can apply up to four schedule sets, separated by commas, for one remote node. Change
the schedule set numbers to your preference(s).
Chapter 37 Call Scheduling
340
P-660H/HW/W-T Series User’ Guide
341
Chapter 37 Call Scheduling
P-660H/HW/W-T Series User’ Guide
CHAPTER 38
Troubleshooting
This chapter covers potential problems and the corresponding remedies.
38.1 Problems Starting Up the Prestige
Table 118 Troubleshooting Starting Up Your Prestige
PROBLEM
CORRECTIVE ACTION
None of the
LEDs turn on
when I turn on
the Prestige.
Make sure that the Prestige’s power adaptor is connected to the Prestige and plugged
in to an appropriate power source. Make sure that the Prestige and the power source
are both turned on.
Turn the Prestige off and on.
If the error persists, you may have a hardware problem. In this case, you should
contact your vendor.
38.2 Problems with the LAN
Table 119 Troubleshooting the LAN
PROBLEM
CORRECTIVE ACTION
The LAN LEDs
do not turn on.
Check your Ethernet cable connections (refer to the Quick Start Guide for details).
Check for faulty Ethernet cables.
Make sure your computer’s Ethernet Card is working properly.
I cannot access
If Any IP is disabled, make sure that the IP address and the subnet mask of the
the Prestige from Prestige and your computer(s) are on the same subnet.
the LAN.
Chapter 38 Troubleshooting
342
P-660H/HW/W-T Series User’ Guide
38.3 Problems with the WAN
Table 120 Troubleshooting the WAN
PROBLEM
CORRECTIVE ACTION
The DSL LED is
off.
Check the telephone wire and connections between the Prestige DSL port and the
wall jack.
Make sure that the telephone company has checked your phone line and set it up
for DSL service.
Reset your ADSL line to reinitialize your link to the DSLAM. For details, refer to the
Table 68 on page 204 (web configurator) or Table 108 on page 304 (SMT).
I cannot get a
WAN IP address
from the ISP.
343
The ISP provides the WAN IP address after authenticating you. Authentication
may be through the user name and password, the MAC address or the host name.
The username and password apply to PPPoE and PPPoA encapsulation only.
Make sure that you have entered the correct Service Type, User Name and
Password (be sure to use the correct casing). Refer to the WAN Setup chapter
(web configurator or SMT).
I cannot access
the Internet.
Make sure the Prestige is turned on and connected to the network.
Verify your WAN settings. Refer to the chapter on WAN setup (web configurator)
or the section on Internet Access (SMT).
Make sure you entered the correct user name and password.
If you use PPPoE pass through, make sure that bridge mode is turned on.
The Internet
connection
disconnects.
Check the schedule rules. Refer to Chapter 37 on page 338 (SMT).
If you use PPPoA or PPPoE encapsulation, check the idle time-out setting. Refer
to the Chapter 6 on page 90 (web configurator) or Chapter 24 on page 236 (SMT).
Contact your ISP.
Chapter 38 Troubleshooting
P-660H/HW/W-T Series User’ Guide
38.4 Problems Accessing the Prestige
Table 121 Troubleshooting Accessing the Prestige
PROBLEM
CORRECTIVE ACTION
I cannot
access the
Prestige.
The username is “admin”. The default password is “1234”. The Password and
Username fields are case-sensitive. Make sure that you enter the correct password
and username using the proper casing.
If you have changed the password and have now forgotten it, you will need to upload
the default configuration file. This restores all of the factory defaults including the
password.
I cannot
access the
web
configurator.
Make sure that there is not an SMT console session running.
Use the Prestige’s WAN IP address when configuring from the WAN. Refer to the
instructions on checking your WAN connection.
Use the Prestige’s LAN IP address when configuring from the LAN. Refer to for
instructions on checking your LAN connection.
Check that you have enabled web service access. If you have configured a secured
client IP address, your computer’s IP address must match it. Refer to the chapter on
remote management for details.
Your computer’s and the Prestige’s IP addresses must be on the same subnet for LAN
access.
If you changed the Prestige’s LAN IP address, then enter the new one as the URL.
Remove any filters in SMT menu 3.1 (LAN) or menu 11.5 (WAN) that block web
service.
See the following section to check that pop-up windows, JavaScripts and Java
permissions are allowed.
38.4.1 Pop-up Windows, JavaScripts and Java Permissions
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device.
• JavaScripts (enabled by default).
• Java permissions (enabled by default).
Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer
versions may vary.
38.4.1.1 Internet Explorer Pop-up Blockers
You may have to disable pop-up blocking to log into your device.
Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or
allow pop-up blocking and create an exception for your device’s IP address.
38.4.1.1.1 Disable pop-up Blockers
1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up
Blocker.
Chapter 38 Troubleshooting
344
P-660H/HW/W-T Series User’ Guide
Figure 223 Pop-up Blocker
You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the
Privacy tab.
1 In Internet Explorer, select Tools, Internet Options, Privacy.
2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This
disables any web pop-up blockers you may have enabled.
Figure 224
Internet Options
3 Click Apply to save this setting.
38.4.1.1.2 Enable pop-up Blockers with Exceptions
Alternatively, if you only want to allow pop-up windows from your device, see the following
steps.
1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
2 Select Settings…to open the Pop-up Blocker Settings screen.
345
Chapter 38 Troubleshooting
P-660H/HW/W-T Series User’ Guide
Figure 225 Internet Options
3 Type the IP address of your device (the web page that you do not want to have blocked)
with the prefix “http://”. For example, http://192.168.1.1.
4 Click Add to move the IP address to the list of Allowed sites.
Chapter 38 Troubleshooting
346
P-660H/HW/W-T Series User’ Guide
Figure 226 Pop-up Blocker Settings
5 Click Close to return to the Privacy screen.
6 Click Apply to save this setting.
38.4.1.2 JavaScripts
If pages of the web configurator do not display properly in Internet Explorer, check that
JavaScripts are allowed.
1 In Internet Explorer, click Tools, Internet Options and then the Security tab.
347
Chapter 38 Troubleshooting
P-660H/HW/W-T Series User’ Guide
Figure 227 Internet Options
2 Click the Custom Level... button.
3 Scroll down to Scripting.
4 Under Active scripting make sure that Enable is selected (the default).
5 Under Scripting of Java applets make sure that Enable is selected (the default).
6 Click OK to close the window.
Chapter 38 Troubleshooting
348
P-660H/HW/W-T Series User’ Guide
Figure 228 Security Settings - Java Scripting
38.4.1.3 Java Permissions
1 From Internet Explorer, click Tools, Internet Options and then the Security tab.
2 Click the Custom Level... button.
3 Scroll down to Microsoft VM.
4 Under Java permissions make sure that a safety level is selected.
5 Click OK to close the window.
349
Chapter 38 Troubleshooting
P-660H/HW/W-T Series User’ Guide
Figure 229 Security Settings - Java
38.4.1.3.1 JAVA (Sun)
1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab.
2 make sure that Use Java 2 for
Source Exif Data:
File Type : PDF
File Type Extension : pdf
MIME Type : application/pdf
PDF Version : 1.6
Linearized : No
Encryption : Standard V2.3 (128-bit)
User Access : Print, Copy, Extract, Print high-res
XMP Toolkit : 3.1-701
Producer : Acrobat Distiller 5.0.5 (Windows)
Modify Date : 2005:07:27 07:30:44-06:00
Create Date : 2005:07:27 13:39:45-07:00
Metadata Date : 2005:07:27 07:30:44-06:00
Creator Tool : FrameMaker 7.1
Format : application/pdf
Creator : Cindy Yang
Title : P-660H/HW/W T Series User's Guide V3.40 (July 2005)
Document ID : uuid:bf6c9cea-5936-47b2-895f-f045dcfc09d9
Instance ID : uuid:d6044ba1-4703-47ea-9605-ccd2436e269f
Page Count : 165
Author : Cindy Yang